DISTRIBUTED computing, in which large-scale computing

Size: px
Start display at page:

Download "DISTRIBUTED computing, in which large-scale computing"

Transcription

1 Proceedings of the International Multiconference on Computer Science and Information Technology pp ISBN IN On the Robustness of the Soft State for Task Scheduling in Large-scale Distributed Computing Environment Harumasa Tada Faculty of Education Kyoto University of Education 1, Fujinomori-cho, Fukakusa, Fushimi-ku, Kyoto , Japan Makoto Imase, Masayuki Murata Graduate School of Information Science and Technology Osaka University 1-5, Yamadaoka, Suita, Osaka , Japan Abstract In this paper, we consider task scheduling in distributed computing. In distributed computing, it is possible that tasks fail, and it is difficult to get accurate information about hosts and tasks. WQR (workqueue with replication), which was proposed by Cirne et al., is a good algorithm because it achieves a short job-completion time without requiring any information about hosts and tasks. However, in order to use WQR for distributed computing, we need to resolve some issues on task failure detection and task cancellation. For this purpose, we examine two approaches the conventional task timeout method and the soft state method. Simulation results showed that the soft state method is more robust than the task timeout method. I. INTRODUCTION DISTRIBUTED computing, in which large-scale computing is performed using the idle CPU times of many PCs, has attracted considerable attention recently. The jobs executed in distributed computing comprise many tasks. These tasks are allocated to PCs and are processed in parallel. Some well-known active distributed computing projects are SETI@home[1] and distributed.net[2]. So far, distributed computing has been mainly used in the limited area of scientific computing for analysis of protein folding, climate simulations, nuclear physics, etc. In these type of applications, the jobs are usually so large that they often take several months to be completed. For such large jobs, the effect of task scheduling on the job completion time is relatively small. Therefore, an efficient task scheduling algorithm is not that important in traditional distributed computing projects. In the future, it is expected that distributed computing will be applied to various types of large-scale computing applications such as analysis of DNA, data mining, simulations of atmospheric circulation or ocean circulation, structural and stress analysis and fluid analysis of the air resistance of cars or planes and the water resistance of ships. These type of applications require many medium-sized jobs that take several hours or days to complete. The job completion time of such medium-sized jobs are affected by task scheduling. In this paper, we discuss task scheduling in distributed computing. Task scheduling in distributed computing has two main goals. The first goal is to minimize the job completion time. In order to complete a job, all tasks that are executed on various hosts should be completed. The delay in a single task can affect the completion time of the whole job. Therefore, the scheduler has to monitor the task execution at each host and perform appropriate actions in response to the change in a situation. The second goal is to minimize the wastage of CPU cycles. In distributed computing, it is common to replicate tasks to achieve good performance. However, using task replicas results in a wastage of CPU cycles. In traditional distributed computing projects, this wastage of CPU cycles has been tolerated because such CPU cycles otherwise go into idle cycles. However, the wastage of CPU cycles implies the wastage of electric power if PCs have power-saving function. Considering recent trend of energy saving, the importance of the reduction in wastage of CPU cycles in distributed computing is increasing. Task scheduling is not a new problem. It has been studied in the area of parallel computers or clusters. However, the distributed computing systems targeted in this paper are different from parallel computers or clusters. The characteristics of distributed computing are listed as follows: Hosts are heterogeneous and autonomous[3]. It is difficult to obtain good information about the hosts[4]. Hosts are often behind NATs (network-address translations) or firewalls[5]. Hosts are frequently turned off by users[5]. In BOINC[5], the well-known distributed computing platform, task scheduling is performed on the basis of the information regarding the processing power of each host and the estimation of the processing time of each task. When this information does not reflect the actual performance, the job completion time deteriorates. In this paper, we investigate a task scheduling method known as WQR (workqueue with replication)[6], which was /8/$25. c 28 IEEE 475

2 476 PROCEEDINGS OF THE IMCSIT. VOLUME 3, 28 originally proposed for heterogeneous Grid environments. The main feature of WQR is that it does not require any kind of information about the hosts or tasks. WQR has the same performance as the existing scheduling method used, which requires informations on the hosts and tasks. For this reason, the use of the WQR method in distributed computing appears promising. The drawback of WQR is the wastage of CPU cycles. In WQR, some CPU cycles are wasted because tasks are replicated and processed by multiple hosts. There are some issues to consider when WQR is applied to distributed computing. First, the original WQR method does not take into account task failures and therefore it is possible that the job will not be completed if task failures occur frequently. In distributed computing, however, task failures are not exceptional because the hosts are frequently turned off by users. Second, the original WQR method assumes that the scheduler is able to cancel executing tasks by sending messages to the hosts. However, in distributed computing, it is difficult for the scheduler to send messages to the hosts because of NATs or firewalls. Therefore, in order to use the WQR method in distributed computing, it is necessary to add additional mechanisms to enable task failure detection and task cancellation. A common approach to solve these issues is to set a timeout for task execution. Most existing distributed computing platforms use this approach[7]. If a scheduler does not receive the result of an allocated task before the timeout, the scheduler creates another replica of the task and allocates it to another host. We call this method as the task timeout method. The task timeout method ensures the completion of all tasks of the job. The problem in this approach is the determination of the appropriate timeout value. The appropriate timeout value depends on the average task execution time and therefore cannot be determined uniquely. The wrong timeout value may cause a delay in job completion and wastage of CPU cycles. Another approach involves the use of the soft state protocol, which improves the robustness of distributed systems[8]. In this approach, hosts and schedulers exchange messages periodically in order to monitor each other s states. Messages are sent in a best-effort (unreliable) manner[9], that is, they are not retransmitted if they are lost. In this study, we used the task timeout method and the soft state method with WQR and compared their performances through simulations. The simulation results showed that the soft state method had a better performance than the task timeout method. The rest of this paper is organized as follows. In section II, we define the distributed computing model and the terms used in this study. In section III, we provide an overview of WQR. In section IV, we explain the issues in applying WQR to distributed computing. In section V, we describe two approaches to deal with these issues. In section VI, we evaluate the performance of these approaches through simulations. Finally, in section VII, we conclude the paper. Fig. 1. client request task Job scheduling server processing task result Model of the distributed computing environment II. THE DISTRIBUTED COMPUTING ENVIRONMENT MODEL Distributed computing involves performing large-scale computations using the idle CPU cycles of many PCs in a network. The participating PCs are known as hosts. We use the term users to refer to the people using the hosts. A task is a unit of scheduling that consists of a program and input data. A job is defined as a set of tasks. Task scheduling involves the allocation of tasks to hosts along with the allocation of the order of execution. Like most distributed computing projects, we consider Bag-of-Tasks applications in which tasks are completely independent[4]. Fig. 1 shows the model of the distributed computing environment considered in this paper. It consists of one scheduler and many hosts. When the scheduler receives a job, it allocates the tasks in the job to hosts. The hosts receive the tasks from the scheduler and send back the results after task completion. We assume that the transfer of tasks and results are performed in a reliable manner using retransmissions. However, hosts sometimes crash because of hardware failures or shutdowns by users. When hosts crash, their tasks also fail. Task failures are not notified explicitly to the scheduler. In this paper, we distinguish between task failure and task cancellation. The former implies that task execution is stopped unexpectedly due to crashing of the host. The latter implies that the task execution is stopped as the task is considered unnecessary by the scheduler. III. WORKQUEUE WITH REPLICATION Workqueue with replication (WQR)[6] is a task scheduling algorithm originally proposed for large-scale distributed systems such as Grids. The main feature of WQR is that it does not require any kind of information about the hosts or tasks. The performance of WQR is equivalent to that of FPLTF[1] or Sufferage[11], which require information about the hosts and tasks[6]. The WQR algorithm uses task replication to achieve a good performance. The scheduler chooses tasks in an arbitrary order and sends them to the hosts. When a host completes its task, it sends the result back to the scheduler and receives a new task

3 HARUMASA TADA ET. AL: ON THE ROBUSTNE OF THE SOFT STATE FOR TASK SCHEDULING 477 from the scheduler. This scheme continues until all the tasks in the job are allocated. In the simple Workqueue algorithm, hosts that complete their tasks become idle. In WQR, however, these hosts are allocated replicas of tasks that are still running. When a task replica finishes at any host, its other replicas are cancelled. Using task replication, WQR can improve the performance of a distributed computing by reducing the delay in completion of tasks allocated to slow/busy hosts. Task replication increases the possibility that at least one replica is allocated to a fast/idle host. However, to avoid wastage of CPU cycles, there is a predefined limit on the number of task replicas. Tasks are replicated until the number of replicas reaches this predefined limit. IV. IUES IN APPLICATION OF WQR TO DISTRIBUTED COMPUTING The concept of WQR is very desirable in a distributed computing environment in which it is difficult to obtain accurate information about the performance of hosts. However, the original WQR algorithm is not recommended for use in a distributed computing environment. When the WQR method is applied to distributed computing, there are some issues to consider. A. Detection of task failure When a task fails, the scheduler should detect the failure and reschedule the failed task to a different host. However, it is very difficult for the scheduler to detect task failures without any notification. In the original WQR method, the number of task replicas that can be created is limited. If all the replicas of a task fail and these failures are not detected by the scheduler, the task can never get completed. Such a situation can be avoided if the number of task replicas is unlimited. However, this increases the wastage of CPU cycles[6]. B. Explicit task cancellation In the original WQR method, when a task replica is completed by any host, the executions of its other replicas are cancelled in order to reduce the wastage of CPU cycles. However, in distributed computing, it is difficult for the scheduler to cancel the tasks executing on hosts. This is because in a distributed computing environment, the hosts are generally behind NATs or firewalls. In this situation, communications are always initiated by the hosts and not by the scheduler. The scheduler cannot send any messages unless the hosts open a connection to the scheduler. Therefore, even though the scheduler receives the results of the completed task, it cannot send messages to the other hosts to cancel the replicas. V. EXTENSIONS OF WQR We consider two approaches to improve the WQR method, i.e., the task timeout method and the soft state method, in order to deal with the issues discussed in section IV. A. Task timeout method In BOINC, the task timeout method, which has an upper limit for task execution time, is used. The scheduler allocates a task to a host and sets the timeout value on the timer. If the scheduler does not receive the result of the task from the host before the timeout period elapses, it reschedules the task to another host. This method ensures the completion of all tasks of the job. A problem with the timeout method is the determination of an appropriate timeout value. The appropriate timeout value depends on the average task execution time. An inappropriate timeout value delays job completion and wastes many CPU cycles. For example, if the timeout value is too small, the scheduler creates redundant replicas of tasks that are still running, while if the timeout value is too large, there is a delay in the detection of failed tasks by the scheduler. The explicit task cancellation mentioned in section IV-B is impossible in the task timeout method. All task replicas are executed until they have completed or failed. B. Soft state method The soft state method was originally proposed for state management of communication protocols[12]. It is characterized by periodic refreshing of information and the initialization of information by timeout. Lui et al. showed that the use of the soft state method makes communication protocols highly robust[8]. In the soft state method, the scheduler and hosts exchange information with each other. Hosts that are executing tasks send refresh messages to the scheduler periodically. On receiving the refresh message, the scheduler sends a reply message to the host. Messages are sent in a best-effort (unreliable) manner, that is, they are not retransmitted if they are lost. If the scheduler does not receive a refresh message before the message timeout, it reschedules the corresponding task to another host. On the other hand, if the host does not receive a reply message before the message timeout, it aborts its task and sends a request for a new task to the scheduler. The main feature of this method is that the scheduler and the hosts are aware of each other s states due to the periodic exchange of messages. On receiving refresh messages from the hosts, the scheduler confirms that the allocated tasks are running normally. The reply messages from the scheduler to the hosts confirm that the scheduler is still waiting for the results of the tasks, that is, the tasks are not cancelled. Thus, the soft state method can perform explicit task cancellation, which cannot be achieved with the task timeout method. By stopping the flow of refresh messages, the scheduler can inform the host that the task is no longer necessary. However, problems can arise if message losses occur frequently. If refresh messages are lost consecutively, the scheduler regards the corresponding task as failed and creates redundant replicas of the task. If reply messages are lost consecutively, the host regards its task replica as cancelled and aborts the necessary task replica. This false task abortion is another cause of task failure.

4 478 PROCEEDINGS OF THE IMCSIT. VOLUME 3, 28 In order to exchange messages with the scheduler, hosts should always be connected to the network. However, since the sizes of refresh and reply messages are very small, the network load added by these messages is negligible compared to the tasks and their results. VI. PERFORMANCE EVALUATION We evaluated the performance of the two methods mentioned in section V through simulations. We assumed that the network transfer times were negligible because our target applications were CPU bound. As the performance criteria, we considered the job completion time and the number of wasted CPU cycles The job completion time is the time between the start of the first task and the completion of the last task. The wasted CPU cycles are the sum of all the CPU cycles that are used for executing task replicas that did not contribute to the final result. Such task replicas include cancelled replicas, failed ones, and redundantly completed ones. In the rest of this section, we will refer to the task timeout method and the soft state method as the TT and methods, respectively. A. Simulation settings In our simulations, the scheduler runs a single job. Therefore, all hosts execute tasks of the same job. Further, each host executes only one task at a time. The processing power of each host is taken from a uniform distribution U(1, 7) and therefore the average processing power of the hosts is 4. The total processing power of all the hosts in the system is fixed to 1. The size of a task is defined as the processing power required to process the task. For example, a task with a size of 1 is processed in 5 s by a host with a processing power of 2. The average task size (denoted as µ) is 1 (large tasks) or 1 (small tasks). The size of each task is an integer taken from a normal distribution with a standard deviation of.4µ. In both cases, the total size of all tasks included in a job is fixed as 1. The number of task replicas is limited to 4 on the basis of the results of the study by Cirne et al.[6], which states that the performance of WQR with a limit of 4 is close to that when the number of task replicas is unlimited. The task failure rate is defined as the inverse of the MTBF (mean time between failures) of tasks. All tasks have the same failure rate regardless of their size. This reflects the fact that large tasks stay in the hosts for a long time and therefore they are more likely to be involved in host crashes. The message loss rate is defined as the ratio of lost messages to total messages sent. If the message loss rate is.1, it implies that 1% of the messages are lost. For the TT method, the simulations were performed by changing the task timeout value. We used three timeout values e s, 2e s, and 4e s. e s is the estimated average task execution time given by e s = µ/p, while p is the average processing power (p = 4, as mentioned in section VI-A). For example, Completion time (s) TT-5 Fig. 2. Plot of the job completion time (µ = 1) TT-5 Fig. 3. Plot of the wasted CPU cycles (µ = 1) Completion time (s) TT-25 TT-5 TT-1 Fig. 4. Plot of the job completion time (µ = 1) if the average task size is 1, then the task timeout values are 25, 5, and 1. In the following graphs, TT-X indicates a task timeout method with timeout value X. In the simulations of the method, refresh messages were sent every 1 s and the message timeout value was set to 1(s). This implies that 1 or more consecutive message losses resulted in rescheduling or abortion of tasks, as mentioned in section V-B. B. Simulation results For each parameter setting, we performed 1 simulations using different jobs. The presented results are the average of the results of the 1 simulations. 1) Effect of task failures: The task failure rate was changed for all simulations. The message loss rate was fixed at.

5 HARUMASA TADA ET. AL: ON THE ROBUSTNE OF THE SOFT STATE FOR TASK SCHEDULING TT-25 TT-5 TT-1 Fig. 5. Plot of the wasted CPU cycles (µ = 1) TT-5 Fig. 6. Plot of the CPU cycles wasted by failed tasks (µ = 1) Completion time (s) TT Message loss rate Fig. 7. Plot of the job completion time (µ = 1) TT Message loss rate Fig. 8. Plot of the wasted CPU cycles (µ = 1) Fig. 2 shows the job completion time when the average task size µ is large. It can be observed that the job completion time of the method is short and the impact of the task failure rate is relatively small. In the case of the TT method, the larger the timeout value, the larger the impact of the task failure rate. The reason for this is the difference in the task failure detections in the TT and methods. When a task fails, the TT method has to wait for the timeout in order to allocate a new replica to another host. Therefore, the large timeout value delays the start of the replica and also delays the task completion. On the other hand, a scheduler using the method can detect task failures immediately because the refresh messages stop when a task fails. Fig. 3 shows the number of wasted CPU cycles. The impact of task failures in the TT method is almost the same regardless of the timeout value. This is because the replica creation in the TT method is triggered by a timeout and therefore is independent of task failures. On the other hand, the number of wasted CPU cycles in the method is almost proportional to the task failure rate. This implies that the number of replicas in the method increases with the number of task failures. However, these replicas reduce the job completion time of the method and therefore they are accepted as a necessary cost. Fig. 4 and Fig. 5 show the performances of the two methods when µ is small. The impact of task failures is very small in both the TT and methods. The reason for this is that small tasks are not likely to be involved in host crashes because of their short stay in the hosts and they do not waste many CPU cycles even if they fail. 2) Effect of the task timeout value: It should be noted that the performance of the TT method is significantly affected by the task timeout value. Since the timeout value defines the maximum task execution time, the appropriate timeout value depends on the average task execution time. Calculation of the average task execution time requires information such as the average task size and the processing power of hosts. The fact that the performance of the TT method depends on this information contradicts the advantage of WQR, which does not require any information about tasks and hosts. Moreover, even if we can calculate the average task execution time (denoted as e), the appropriate timeout value for the TT method cannot be determined by a simple calculation such as e F, where F is some fixed value. There are two ways in which the task timeout value affects task execution. 1) If the timeout value is extremely large, the creation of a new replica of a failed task is delayed, and as a result, the completion of the task is also delayed. 2) If the timeout value is very small, many redundant replicas are created and they consume computing resources. Fig. 2 (when e is large) shows that a timeout value smaller than e is desirable. However, Fig. 4 (when e is small) shows the opposite behavior. These results indicate that effect (1) is dominant for large e and effect (2) is dominant for small e. It is very difficult to estimate the effect of the timeout value on task execution for a given value of e. 3) Effect of task cancellation: It should be noted that in Fig. 3, the number of wasted CPU cycles in TT increases as the task failure rate decreases. The scheduler using TT is not

6 48 PROCEEDINGS OF THE IMCSIT. VOLUME 3, 28 able to cancel the execution of task replicas even if they are unnecessary. Therefore, even for a low task failure rate, many redundant replicas are executed to the end, and they waste many CPU cycles. On the other hand, the number of wasted CPU cycles in the method decreases as the task failure rate decreases. The scheduler using the method cancels task replicas as soon as they became unnecessary. Therefore, redundant replicas are cancelled before they waste CPU cycles. This result shows that s explicit cancellation of redundant replicas is effective in reducing the wastage of CPU cycles. When the task failure rate is high, however, the difference between and TT is small. This is because a high task failure rate implies that many replicas including redundant ones fail frequently. Fig. 6 shows the wasted CPU cycles of failed tasks. From the graph, it can be observed that most of the wasted CPU cycles are those of failed tasks. In this case, most redundant replicas in failed before they were cancelled explicitly. 4) Effect of message losses: We also investigated the effect of changing the message loss rate of the simulations. The average task size is 1 and the task failure rate is fixed to 1 (time/1 s). Fig. 7 and Fig. 8 show the job completion time and the number of wasted CPU cycles, respectively. It is obvious that the performance of the TT method is not affected by the message loss rate because the TT method does not exchange any messages during task execution. The performance of is also not affected as long as the message loss rate is lower than a threshold value (approximately.3 in the graph). However, as the message loss rate increases above the threshold, the performance of the method degrades significantly. In the method, consecutive message losses cause false task abortion (as mentioned in section V-B). If the host aborts its task replica, the scheduler regards the task as failed and allocates a new task replica. However, when the message loss rate is very high, this new task replica may be aborted again. If the message loss rate is higher than the threshold, such abortions occur repeatedly, and the task completion is significantly delayed. The threshold is determined by the refresh interval and the timeout value of the method. It should be noted that this result does not necessarily mean that the method is not robust against message losses. A significant degradation in performance occurs only when the high message loss rate continues permanently, which is impractical in real networks. A temporary increase in message losses does not affect the performance of. VII. CONCLUSIONS In this paper, we investigated task scheduling in distributed computing. We selected WQR as the scheduling method because it does not require any kind of information about the hosts or tasks. We used the conventional task timeout method and the soft state method with WQR and compared their performances through simulations. The simulation results are summarized as follows. The soft state method is more robust than the task timeout method against task failures. The performance of the task timeout method depends on the timeout value, and it is difficult to calculate the appropriate timeout value. The soft state method wastes less CPU cycles than the task timeout method when the task failure rate is low. There is a threshold for the message loss rate, over which the performance of the soft state method degrades significantly. From these results, we can conclude that the soft state method is preferable to the task timeout method for task scheduling in distributed computing. REFERENCES [1] D. P. Anderson, J. Cobb, E. Korpela, M. Lebofsky, and D. Werthimer, SETI@home: An Experiment in Public-Resource Computing, Communications of the ACM, vol. 45, no. 11, pp , Nov. 22. [2] distributed.net, Node Zero, [3] F. Dong and S. G. Akl, Scheduling Algorithms for Grid Computing: State of the Art and Open Problems, No.26-54, Queen s University School of Computing, Tech. Rep., Jan. 26. [4] D. Paranhos, W. Cirne, and F. V. Brasileiro, Trading Cycles for Information: Using Replication to Schedule Bag-of-Tasks Applications on Computational Grids, in Proc. of the EuroPar 23: Intl. Conf. on Parallel and Distributed Computing, Klagenfurt, Austria, 23, pp [5] D. P. Anderson, BOINC: A System for Public-Resource Computing and Storage, in Proc. of 5th IEEE/ACM Intl. Workshop on Grid Computing, Pittsburgh, PA, USA, 24, pp [6] W. Cirne, D. Paranhos, F. Brasileiro, and L. F. W. Goes, On the Efficacy, Efficiency and Emergent Behavior of Task Replication in Large Distributed Systems, Parallel Computing, vol. 33, no. 3, pp , 27. [7] D. P. Anderson, E. Korpela, and R. Walton, High-Performance Task Distribution for Volunteer Computing, in Proc. of First IEEE Intl. Conf. on e-science and Grid Technologies, Melbourne, Australia, 25, pp [8] J. C. S. Lui, V. Misra, and D. Rubenstein, On the Robustness of Soft State Protocols, in Proc. of 12th IEEE Intl. Conf. on Network Protocols (ICNP 4), Berlin, Germany, 24, pp [9] P. Ji, Z. Ge, J. Kurose, and D. Towsley, A Comparison of hardstate and soft-state Signaling Protocols, in Proc. of the 23 Conf. on Applications, technologies, architectures, and protocols for computer communications, Karlsruhe, Germany, 23, pp [1] D. Menascé, D. Saha, S. da S. Porto, V. Almeida, and S. Tripathi, Static and Dynamic Processor Scheduling Disciplines in Heterogeneous Parallel Architectures, Journal of Parallel and Distributed Computing, vol. 28, pp. 1 18, [11] H. Casanova, A. Legrand, D. Zagorodnov, and F. Berman, Heuristics for Scheduling Parameter Sweep Applications in Grid Environments, in Proc. of the 9th Heterogeneous Computing Workshop (HCW ), Cancun, Mexico, 2, pp [12] S. Raman and S. McCanne, A Model, Analysis, and Protocol Framework for Soft State-based Communication, in Proc. of ACM SIG- COMM, Cambridge, MA, USA, 1999, pp

A Fault Tolerant Scheduler with Dynamic Replication in Desktop Grid Environment

A Fault Tolerant Scheduler with Dynamic Replication in Desktop Grid Environment A Fault Tolerant Scheduler with Dynamic Replication in Desktop Grid Environment Jyoti Bansal 1, Dr. Shaveta Rani 2, Dr. Paramjit Singh 3 1 Research Scholar,PTU, Kapurthala 2,3 Punjab Technical University

More information

An Adaptive Query Processing Method according to System Environments in Database Broadcasting Systems

An Adaptive Query Processing Method according to System Environments in Database Broadcasting Systems An Query Processing Method according to System Environments in Database Broadcasting Systems M. KASHITA T. TERADA T. HARA Graduate School of Engineering, Cybermedia Center, Graduate School of Information

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

Scheduling Algorithms for Multiple Bag-of-Task Applications on Desktop Grids: a Knowledge-Free Approach

Scheduling Algorithms for Multiple Bag-of-Task Applications on Desktop Grids: a Knowledge-Free Approach Scheduling Algorithms for Multiple Bag-of-Task Applications on Desktop Grids: a Knowledge-Free Approach Cosimo Anglano, Massimo Canonico Dipartimento di Informatica, Università del Piemonte Orientale (Italy),

More information

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Yukinobu Fukushima Graduate School of Information Science and Technology, Osaka University - Yamadaoka, Suita, Osaka 60-08, Japan

More information

A Route Selection Scheme for Multi-Route Coding in Multihop Cellular Networks

A Route Selection Scheme for Multi-Route Coding in Multihop Cellular Networks A Route Selection Scheme for Multi-Route Coding in Multihop Cellular Networks Hiraku Okada,HitoshiImai, Takaya Yamazato, Masaaki Katayama, Kenichi Mase Center for Transdisciplinary Research, Niigata University,

More information

CS 578 Software Architectures Fall 2014 Homework Assignment #1 Due: Wednesday, September 24, 2014 see course website for submission details

CS 578 Software Architectures Fall 2014 Homework Assignment #1 Due: Wednesday, September 24, 2014 see course website for submission details CS 578 Software Architectures Fall 2014 Homework Assignment #1 Due: Wednesday, September 24, 2014 see course website for submission details The Berkeley Open Infrastructure for Network Computing (BOINC)

More information

Improving TCP throughput using forward error correction

Improving TCP throughput using forward error correction This article has been accepted and published on J-STAGE in advance of copyediting. Content is final as presented. IEICE Communications Express, Vol., 1 6 Improving TCP throughput using forward error correction

More information

Lazy Agent Replication and Asynchronous Consensus for the Fault-Tolerant Mobile Agent System

Lazy Agent Replication and Asynchronous Consensus for the Fault-Tolerant Mobile Agent System Lazy Agent Replication and Asynchronous Consensus for the Fault-Tolerant Mobile Agent System Taesoon Park 1,IlsooByun 1, and Heon Y. Yeom 2 1 Department of Computer Engineering, Sejong University, Seoul

More information

Resource Usage Monitoring for Web Systems Using Real-time Statistical Analysis of Log Data

Resource Usage Monitoring for Web Systems Using Real-time Statistical Analysis of Log Data Resource Usage Monitoring for Web Systems Using Real- Statistical Analysis of Log Data MATSUKI YOSHINO, ATSURO HANDA Software Division, Hitachi Ltd. 53, Totsuka-cho, Totsuka-ku, Yokohama, 244-8555 JAPAN

More information

Low-Energy-Consumption Ad Hoc Mesh Network Based on Intermittent Receiver-driven Transmission

Low-Energy-Consumption Ad Hoc Mesh Network Based on Intermittent Receiver-driven Transmission Low-Energy-Consumption Ad Hoc Mesh Network Based on Intermittent Receiver-driven Transmission Masashi Sugano 1, Ryo Fukushima 2, Masayuki Murata 2, Takayoshi Hayashi 3, Takaaki Hatauchi 3 1 School of Comprehensive

More information

Management of Protocol State

Management of Protocol State Management of Protocol State Ibrahim Matta December 2012 1 Introduction These notes highlight the main issues related to synchronizing the data at both sender and receiver of a protocol. For example, in

More information

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted

More information

A Data-Aware Resource Broker for Data Grids

A Data-Aware Resource Broker for Data Grids A Data-Aware Resource Broker for Data Grids Huy Le, Paul Coddington, and Andrew L. Wendelborn School of Computer Science, University of Adelaide Adelaide, SA 5005, Australia {paulc,andrew}@cs.adelaide.edu.au

More information

Constructing a P2P-Based High Performance Computing Platform*

Constructing a P2P-Based High Performance Computing Platform* Constructing a P2P-Based High Performance Computing Platform* Hai Jin, Fei Luo, Xiaofei Liao, Qin Zhang, and Hao Zhang Cluster and Grid Computing Laboratory, Huazhong University of Science and Technology,

More information

Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques

Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques Kouhei Sugiyama, Hiroyuki Ohsaki and Makoto Imase Graduate School of Information Science and Technology,

More information

A Method of Annotation Extraction from Paper Documents Using Alignment Based on Local Arrangements of Feature Points

A Method of Annotation Extraction from Paper Documents Using Alignment Based on Local Arrangements of Feature Points A Method of Annotation Extraction from Paper Documents Using Alignment Based on Local Arrangements of Feature Points Tomohiro Nakai, Koichi Kise, Masakazu Iwamura Graduate School of Engineering, Osaka

More information

Labs of the World, Unite!!!

Labs of the World, Unite!!! Labs of the World, Unite!!! Walfredo Cirne walfredo@dsc.ufcg.edu.br Universidade Federal de Campina Grande, Brasil Departamento de Sistemas e Computação Laboratório de Sistemas Distribuídos http://www.lsd.ufcg.edu.br/

More information

Bagging and Boosting Algorithms for Support Vector Machine Classifiers

Bagging and Boosting Algorithms for Support Vector Machine Classifiers Bagging and Boosting Algorithms for Support Vector Machine Classifiers Noritaka SHIGEI and Hiromi MIYAJIMA Dept. of Electrical and Electronics Engineering, Kagoshima University 1-21-40, Korimoto, Kagoshima

More information

Performance Evaluation of Intermittent Receiver-driven Data Transmission on Wireless Sensor Networks

Performance Evaluation of Intermittent Receiver-driven Data Transmission on Wireless Sensor Networks Performance Evaluation of Intermittent Receiver-driven Data Transmission on Wireless Sensor Networks Daichi Kominami #, Masashi Sugano 2, Masayuki Murata #3 Takaaki Hatauchi $, Yoshikazu Fukuyama $5 #

More information

RD-TCP: Reorder Detecting TCP

RD-TCP: Reorder Detecting TCP RD-TCP: Reorder Detecting TCP Arjuna Sathiaseelan and Tomasz Radzik Department of Computer Science, King s College London, Strand, London WC2R 2LS {arjuna,radzik}@dcs.kcl.ac.uk Abstract. Numerous studies

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

A New Combinatorial Design of Coded Distributed Computing

A New Combinatorial Design of Coded Distributed Computing A New Combinatorial Design of Coded Distributed Computing Nicholas Woolsey, Rong-Rong Chen, and Mingyue Ji Department of Electrical and Computer Engineering, University of Utah Salt Lake City, UT, USA

More information

Scheduling Algorithms to Minimize Session Delays

Scheduling Algorithms to Minimize Session Delays Scheduling Algorithms to Minimize Session Delays Nandita Dukkipati and David Gutierrez A Motivation I INTRODUCTION TCP flows constitute the majority of the traffic volume in the Internet today Most of

More information

OVERHEADS ENHANCEMENT IN MUTIPLE PROCESSING SYSTEMS BY ANURAG REDDY GANKAT KARTHIK REDDY AKKATI

OVERHEADS ENHANCEMENT IN MUTIPLE PROCESSING SYSTEMS BY ANURAG REDDY GANKAT KARTHIK REDDY AKKATI CMPE 655- MULTIPLE PROCESSOR SYSTEMS OVERHEADS ENHANCEMENT IN MUTIPLE PROCESSING SYSTEMS BY ANURAG REDDY GANKAT KARTHIK REDDY AKKATI What is MULTI PROCESSING?? Multiprocessing is the coordinated processing

More information

Nowadays data-intensive applications play a

Nowadays data-intensive applications play a Journal of Advances in Computer Engineering and Technology, 3(2) 2017 Data Replication-Based Scheduling in Cloud Computing Environment Bahareh Rahmati 1, Amir Masoud Rahmani 2 Received (2016-02-02) Accepted

More information

A new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake

A new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake Mobile Information Systems 5 (009) 3 DOI 0.333/MIS-009-0070 IOS Press A new MAC protocol for reducing effect of needless transmission deferment induced by missed / handshake Tetsuya Shigeyasu a, Daishi

More information

Job Re-Packing for Enhancing the Performance of Gang Scheduling

Job Re-Packing for Enhancing the Performance of Gang Scheduling Job Re-Packing for Enhancing the Performance of Gang Scheduling B. B. Zhou 1, R. P. Brent 2, C. W. Johnson 3, and D. Walsh 3 1 Computer Sciences Laboratory, Australian National University, Canberra, ACT

More information

OPAX - An Open Peer-to-Peer Architecture for XML Message Exchange

OPAX - An Open Peer-to-Peer Architecture for XML Message Exchange OPAX - An Open Peer-to-Peer Architecture for XML Message Exchange Bernhard Schandl, University of Vienna bernhard.schandl@univie.ac.at Users wishing to find multimedia material about interesting events

More information

RED behavior with different packet sizes

RED behavior with different packet sizes RED behavior with different packet sizes Stefaan De Cnodder, Omar Elloumi *, Kenny Pauwels Traffic and Routing Technologies project Alcatel Corporate Research Center, Francis Wellesplein, 1-18 Antwerp,

More information

Performance Modeling and Evaluation of Web Systems with Proxy Caching

Performance Modeling and Evaluation of Web Systems with Proxy Caching Performance Modeling and Evaluation of Web Systems with Proxy Caching Yasuyuki FUJITA, Masayuki MURATA and Hideo MIYAHARA a a Department of Infomatics and Mathematical Science Graduate School of Engineering

More information

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes Replica Distribution Scheme for Location-Dependent Data in Vehicular d Hoc Networks using a Small Number of Fixed Nodes Junichiro Okamoto and Susumu Ishihara Graduate School of Engineering, Shizuoka University,

More information

Application Distribution Model In Volunteer Computing Environment Using Peer-to-Peer Torrent Like Approach

Application Distribution Model In Volunteer Computing Environment Using Peer-to-Peer Torrent Like Approach 2013 International Conference on Computer, Control, Informatics and Its Application Application Distribution Model In Volunteer Computing Environment Using Peer-to-Peer Torrent Like Approach Yustinus Eko

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

Grid Middleware for Realizing Autonomous Resource Sharing: Grid Service Platform

Grid Middleware for Realizing Autonomous Resource Sharing: Grid Service Platform Grid Middleware for Realizing Autonomous Resource Sharing: Grid Service Platform V Soichi Shigeta V Haruyasu Ueda V Nobutaka Imamura (Manuscript received April 19, 27) These days, many enterprises are

More information

Fault Tolerance Techniques in Grid Computing Systems

Fault Tolerance Techniques in Grid Computing Systems Fault Tolerance Techniques in Grid Computing Systems T. Altameem Dept. of Computer Science, RCC, King Saud University, P.O. Box: 28095 11437 Riyadh-Saudi Arabia. Abstract- In grid computing, resources

More information

On the Impact of Route Processing and MRAI Timers on BGP Convergence Times

On the Impact of Route Processing and MRAI Timers on BGP Convergence Times On the Impact of Route Processing and MRAI Timers on BGP Convergence Times Shivani Deshpande and Biplab Sikdar Department of ECSE, Rensselaer Polytechnic Institute, Troy, NY 12180 Abstract Fast convergence

More information

Lixia Zhang M. I. T. Laboratory for Computer Science December 1985

Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 Network Working Group Request for Comments: 969 David D. Clark Mark L. Lambert Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 1. STATUS OF THIS MEMO This RFC suggests a proposed protocol

More information

Towards Ensuring Collective Availability in Volatile Resource Pools via Forecasting

Towards Ensuring Collective Availability in Volatile Resource Pools via Forecasting Towards CloudComputing@home: Ensuring Collective Availability in Volatile Resource Pools via Forecasting Artur Andrzejak Berlin (ZIB) andrzejak[at]zib.de Zuse-Institute Derrick Kondo David P. Anderson

More information

Stability Analysis of a Window-based Flow Control Mechanism for TCP Connections with Different Propagation Delays

Stability Analysis of a Window-based Flow Control Mechanism for TCP Connections with Different Propagation Delays Stability Analysis of a Window-based Flow Control Mechanism for TCP Connections with Different Propagation Delays Keiichi Takagaki Hiroyuki Ohsaki Masayuki Murata Graduate School of Engineering Science,

More information

New Optimal Load Allocation for Scheduling Divisible Data Grid Applications

New Optimal Load Allocation for Scheduling Divisible Data Grid Applications New Optimal Load Allocation for Scheduling Divisible Data Grid Applications M. Othman, M. Abdullah, H. Ibrahim, and S. Subramaniam Department of Communication Technology and Network, University Putra Malaysia,

More information

The missing links in the BGP-based AS connectivity maps

The missing links in the BGP-based AS connectivity maps The missing links in the BGP-based AS connectivity maps Zhou, S; Mondragon, RJ http://arxiv.org/abs/cs/0303028 For additional information about this publication click this link. http://qmro.qmul.ac.uk/xmlui/handle/123456789/13070

More information

Master s Thesis. A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems

Master s Thesis. A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems Master s Thesis Title A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems Supervisor Professor Masayuki Murata Author Hideto Horiuchi February 14th, 2007 Department

More information

PAPER Two-Way Release Message Transmission and Its Wavelength Selection Rules for Preemption in OBS Networks

PAPER Two-Way Release Message Transmission and Its Wavelength Selection Rules for Preemption in OBS Networks IEICE TRANS. COMMUN., VOL.E90 B, NO.5 MAY 2007 1079 PAPER Two-Way Release Message Transmission and Its Wavelength Selection Rules for Preemption in OBS Networks Takuji TACHIBANA a) and Shoji KASAHARA b),

More information

Double Threshold Based Load Balancing Approach by Using VM Migration for the Cloud Computing Environment

Double Threshold Based Load Balancing Approach by Using VM Migration for the Cloud Computing Environment www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 1 January 2015, Page No. 9966-9970 Double Threshold Based Load Balancing Approach by Using VM Migration

More information

Communication Networks for the Next-Generation Vehicles

Communication Networks for the Next-Generation Vehicles Communication Networks for the, Ph.D. Electrical and Computer Engg. Dept. Wayne State University Detroit MI 48202 (313) 577-3855, smahmud@eng.wayne.edu January 13, 2005 4 th Annual Winter Workshop U.S.

More information

Incorporation of Scalarizing Fitness Functions into Evolutionary Multiobjective Optimization Algorithms

Incorporation of Scalarizing Fitness Functions into Evolutionary Multiobjective Optimization Algorithms H. Ishibuchi, T. Doi, and Y. Nojima, Incorporation of scalarizing fitness functions into evolutionary multiobjective optimization algorithms, Lecture Notes in Computer Science 4193: Parallel Problem Solving

More information

Distributed System Chapter 16 Issues in ch 17, ch 18

Distributed System Chapter 16 Issues in ch 17, ch 18 Distributed System Chapter 16 Issues in ch 17, ch 18 1 Chapter 16: Distributed System Structures! Motivation! Types of Network-Based Operating Systems! Network Structure! Network Topology! Communication

More information

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks , March 12-14, 2014, Hong Kong Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks Takuro Yamamoto, Takuji Tachibana, Abstract Recently,

More information

Evolving fault-tolerance in Hadoop with robust auto-recovering JobTracker

Evolving fault-tolerance in Hadoop with robust auto-recovering JobTracker Bulletin of Networking, Computing, Systems, and Software www.bncss.org, ISSN 2186 5140 Volume 2, Number 1, pages 4 11, January 2013 Evolving fault-tolerance in Hadoop with robust auto-recovering JobTracker

More information

Fault Tolerance. Distributed Systems IT332

Fault Tolerance. Distributed Systems IT332 Fault Tolerance Distributed Systems IT332 2 Outline Introduction to fault tolerance Reliable Client Server Communication Distributed commit Failure recovery 3 Failures, Due to What? A system is said to

More information

Analysis and Algorithms for Partial Protection in Mesh Networks

Analysis and Algorithms for Partial Protection in Mesh Networks Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu Aradhana Narula-Tam MIT

More information

Dynamic Load balancing for I/O- and Memory- Intensive workload in Clusters using a Feedback Control Mechanism

Dynamic Load balancing for I/O- and Memory- Intensive workload in Clusters using a Feedback Control Mechanism Dynamic Load balancing for I/O- and Memory- Intensive workload in Clusters using a Feedback Control Mechanism Xiao Qin, Hong Jiang, Yifeng Zhu, David R. Swanson Department of Computer Science and Engineering

More information

Congestion Propagation among Routers in the Internet

Congestion Propagation among Routers in the Internet Congestion Propagation among Routers in the Internet Kouhei Sugiyama, Hiroyuki Ohsaki and Makoto Imase Graduate School of Information Science and Technology, Osaka University -, Yamadaoka, Suita, Osaka,

More information

Congestion control mechanism of TCP for achieving predictable throughput

Congestion control mechanism of TCP for achieving predictable throughput Congestion control mechanism of TCP for achieving predictable throughput Kana Yamanegi Go Hasegawa Masayuki Murata Graduate School of Information Science and Technology, Osaka University 1-5 Yamadaoka,

More information

Enhancing Downloading Time By Using Content Distribution Algorithm

Enhancing Downloading Time By Using Content Distribution Algorithm RESEARCH ARTICLE OPEN ACCESS Enhancing Downloading Time By Using Content Distribution Algorithm VILSA V S Department of Computer Science and Technology TKM Institute of Technology, Kollam, Kerala Mailid-vilsavijay@gmail.com

More information

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks Yoriko Utsunomiya, Michito Takahashi, Masaki Bandai, and Iwao Sasase

More information

A transport-layer approach for achieving predictable throughput for Internet applications

A transport-layer approach for achieving predictable throughput for Internet applications Seventh International Conference on Networking A transport-layer approach for achieving predictable throughput for Internet applications Go Hasegawa, Kana Yamanegi and Masayuki Murata Graduate School of

More information

An Experimental Investigation into the Rank Function of the Heterogeneous Earliest Finish Time Scheduling Algorithm

An Experimental Investigation into the Rank Function of the Heterogeneous Earliest Finish Time Scheduling Algorithm An Experimental Investigation into the Rank Function of the Heterogeneous Earliest Finish Time Scheduling Algorithm Henan Zhao and Rizos Sakellariou Department of Computer Science, University of Manchester,

More information

Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs)

Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs) Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs) Dr. Mohammed Ahmed Abdala, Mustafa Hussein Jabbar College of Information Engineering, Al-Nahrain University,

More information

Incompatibility Dimensions and Integration of Atomic Commit Protocols

Incompatibility Dimensions and Integration of Atomic Commit Protocols The International Arab Journal of Information Technology, Vol. 5, No. 4, October 2008 381 Incompatibility Dimensions and Integration of Atomic Commit Protocols Yousef Al-Houmaily Department of Computer

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing 244 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 2, APRIL 2002 Heuristic Algorithms for Multiconstrained Quality-of-Service Routing Xin Yuan, Member, IEEE Abstract Multiconstrained quality-of-service

More information

LOW-DENSITY PARITY-CHECK (LDPC) codes [1] can

LOW-DENSITY PARITY-CHECK (LDPC) codes [1] can 208 IEEE TRANSACTIONS ON MAGNETICS, VOL 42, NO 2, FEBRUARY 2006 Structured LDPC Codes for High-Density Recording: Large Girth and Low Error Floor J Lu and J M F Moura Department of Electrical and Computer

More information

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS Deddy Chandra and Richard J. Harris School of Electrical and Computer System Engineering Royal Melbourne Institute of Technology Melbourne, Australia

More information

1 Gokuldev S, 2 Valarmathi M 1 Associate Professor, 2 PG Scholar

1 Gokuldev S, 2 Valarmathi M 1 Associate Professor, 2 PG Scholar Fault Tolerant System for Computational and Service Grid 1 Gokuldev S, 2 Valarmathi M 1 Associate Professor, 2 PG Scholar Department of Computer Science and Engineering, SNS College of Engineering, Coimbatore,

More information

Scalable IP-VPN Flow Control Mechanism Supporting Arbitrary Fairness Criteria Part 2: Simulation and Implementation

Scalable IP-VPN Flow Control Mechanism Supporting Arbitrary Fairness Criteria Part 2: Simulation and Implementation Scalable IP-VPN Flow Control Mechanism Supporting Arbitrary Fairness Criteria Part 2: Simulation and Implementation Osamu Honda, Hiroyuki Ohsaki, Makoto Imase Graduate School of Information Science and

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV)

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) WADHAH AL-MANDHARI, KOICHI GYODA 2, NOBUO NAKAJIMA Department of Human Communications The University

More information

Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption

Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption Ruilong Deng 1,4, Rongxing Lu 1, Chengzhe Lai 2, Tom H. Luan 3, and Hao Liang 4 1: Nanyang Technological University,

More information

Module 16: Distributed System Structures. Operating System Concepts 8 th Edition,

Module 16: Distributed System Structures. Operating System Concepts 8 th Edition, Module 16: Distributed System Structures, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed System Structures Motivation Types of Network-Based Operating Systems Network Structure Network Topology

More information

Module 16: Distributed System Structures

Module 16: Distributed System Structures Chapter 16: Distributed System Structures Module 16: Distributed System Structures Motivation Types of Network-Based Operating Systems Network Structure Network Topology Communication Structure Communication

More information

The Design and Performance Analysis of QoS-Aware Edge-Router for High-Speed IP Optical Networks

The Design and Performance Analysis of QoS-Aware Edge-Router for High-Speed IP Optical Networks The Design and Performance Analysis of QoS-Aware Edge-Router for High-Speed IP Optical Networks E. Kozlovski, M. Düser, R. I. Killey, and P. Bayvel Department of and Electrical Engineering, University

More information

An Orthogonal and Fault-Tolerant Subsystem for High-Precision Clock Synchronization in CAN Networks *

An Orthogonal and Fault-Tolerant Subsystem for High-Precision Clock Synchronization in CAN Networks * An Orthogonal and Fault-Tolerant Subsystem for High-Precision Clock Synchronization in Networks * GUILLERMO RODRÍGUEZ-NAVAS and JULIÁN PROENZA Departament de Matemàtiques i Informàtica Universitat de les

More information

TCP over ad hoc networks

TCP over ad hoc networks TCP over ad hoc networks Ad Hoc Networks will have to be interfaced with the Internet. As such backward compatibility is a big issue. One might expect that the TCP/IP suite of protocols be applicable to

More information

Real-Time Document Image Retrieval for a 10 Million Pages Database with a Memory Efficient and Stability Improved LLAH

Real-Time Document Image Retrieval for a 10 Million Pages Database with a Memory Efficient and Stability Improved LLAH 2011 International Conference on Document Analysis and Recognition Real-Time Document Image Retrieval for a 10 Million Pages Database with a Memory Efficient and Stability Improved LLAH Kazutaka Takeda,

More information

Cycle Sharing Systems

Cycle Sharing Systems Cycle Sharing Systems Jagadeesh Dyaberi Dependable Computing Systems Lab Purdue University 10/31/2005 1 Introduction Design of Program Security Communication Architecture Implementation Conclusion Outline

More information

Enhanced Live Migration of Virtual Machine Using Comparison of Modified and Unmodified Pages

Enhanced Live Migration of Virtual Machine Using Comparison of Modified and Unmodified Pages Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL)

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL) Qos of Network Using Advanced Hybrid Routing in WMN, Abstract - Maximizing the network throughput in a multichannel multiradio wireless mesh network various efforts have been devoted. The recent solutions

More information

Scalable Computing: Practice and Experience Volume 10, Number 4, pp

Scalable Computing: Practice and Experience Volume 10, Number 4, pp Scalable Computing: Practice and Experience Volume 10, Number 4, pp. 413 418. http://www.scpe.org ISSN 1895-1767 c 2009 SCPE MULTI-APPLICATION BAG OF JOBS FOR INTERACTIVE AND ON-DEMAND COMPUTING BRANKO

More information

Database Architectures

Database Architectures Database Architectures CPS352: Database Systems Simon Miner Gordon College Last Revised: 11/15/12 Agenda Check-in Centralized and Client-Server Models Parallelism Distributed Databases Homework 6 Check-in

More information

Enhanced Round Robin Technique with Variant Time Quantum for Task Scheduling In Grid Computing

Enhanced Round Robin Technique with Variant Time Quantum for Task Scheduling In Grid Computing International Journal of Emerging Trends in Science and Technology IC Value: 76.89 (Index Copernicus) Impact Factor: 4.219 DOI: https://dx.doi.org/10.18535/ijetst/v4i9.23 Enhanced Round Robin Technique

More information

A New Fuzzy Algorithm for Dynamic Load Balancing In Distributed Environment

A New Fuzzy Algorithm for Dynamic Load Balancing In Distributed Environment A New Fuzzy Algorithm for Dynamic Load Balancing In Distributed Environment Nidhi Kataria Chawla Assistant Professor (Babu Banarsi Das University, Luck now) U.P, India ernidhikataria@gmail.com Abstract

More information

Analysis of a Window-Based Flow Control Mechanism based on TCP Vegas in Heterogeneous Network Environment Keiichi Takagaki Hiroyuki Ohsaki

Analysis of a Window-Based Flow Control Mechanism based on TCP Vegas in Heterogeneous Network Environment Keiichi Takagaki Hiroyuki Ohsaki Analysis of a Window-Based Flow Control Mechanism based on TCP Vegas in Heterogeneous Network Environment Keiichi Takagaki Hiroyuki Ohsaki Masayuki Murata Graduate School of Engineering Science, Osaka

More information

Star: Sla-Aware Autonomic Management of Cloud Resources

Star: Sla-Aware Autonomic Management of Cloud Resources Star: Sla-Aware Autonomic Management of Cloud Resources Sakshi Patil 1, Meghana N Rathod 2, S. A Madival 3, Vivekanand M Bonal 4 1, 2 Fourth Sem M. Tech Appa Institute of Engineering and Technology Karnataka,

More information

Cluster quality assessment by the modified Renyi-ClipX algorithm

Cluster quality assessment by the modified Renyi-ClipX algorithm Issue 3, Volume 4, 2010 51 Cluster quality assessment by the modified Renyi-ClipX algorithm Dalia Baziuk, Aleksas Narščius Abstract This paper presents the modified Renyi-CLIPx clustering algorithm and

More information

FEC Performance in Large File Transfer over Bursty Channels

FEC Performance in Large File Transfer over Bursty Channels FEC Performance in Large File Transfer over Bursty Channels Shuichiro Senda, Hiroyuki Masuyama, Shoji Kasahara and Yutaka Takahashi Graduate School of Informatics, Kyoto University, Kyoto 66-85, Japan

More information

Distributed Systems COMP 212. Lecture 19 Othon Michail

Distributed Systems COMP 212. Lecture 19 Othon Michail Distributed Systems COMP 212 Lecture 19 Othon Michail Fault Tolerance 2/31 What is a Distributed System? 3/31 Distributed vs Single-machine Systems A key difference: partial failures One component fails

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

A Robust Bloom Filter

A Robust Bloom Filter A Robust Bloom Filter Yoon-Hwa Choi Department of Computer Engineering, Hongik University, Seoul, Korea. Orcid: 0000-0003-4585-2875 Abstract A Bloom filter is a space-efficient randomized data structure

More information

IJRIM Volume 2, Issue 2 (February 2012) (ISSN )

IJRIM Volume 2, Issue 2 (February 2012) (ISSN ) AN ENHANCED APPROACH TO OPTIMIZE WEB SEARCH BASED ON PROVENANCE USING FUZZY EQUIVALENCE RELATION BY LEMMATIZATION Divya* Tanvi Gupta* ABSTRACT In this paper, the focus is on one of the pre-processing technique

More information

Distributed Fault-Tolerant Channel Allocation for Cellular Networks

Distributed Fault-Tolerant Channel Allocation for Cellular Networks 1326 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 7, JULY 2000 Distributed Fault-Tolerant Channel Allocation for Cellular Networks Guohong Cao, Associate Member, IEEE, and Mukesh Singhal,

More information

Fluid models for evaluating threshold-based control policies for survivability of a distributed network

Fluid models for evaluating threshold-based control policies for survivability of a distributed network Fluid models for evaluating threshold-based control policies for survivability of a distributed network Vineet Aggarwal ICF Consulting 9 Lee Highway, Fairfax, VA Nataraan Gautam Marcus Department of Industrial

More information

Incorporating Data Movement into Grid Task Scheduling

Incorporating Data Movement into Grid Task Scheduling Incorporating Data Movement into Grid Task Scheduling Xiaoshan He 1, Xian-He Sun 1 1 Department of Computer Science, Illinois Institute of Technology Chicago, Illinois, 60616, USA {hexiaos, sun}@iit.edu

More information

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West

More information

CSE 5306 Distributed Systems

CSE 5306 Distributed Systems CSE 5306 Distributed Systems Fault Tolerance Jia Rao http://ranger.uta.edu/~jrao/ 1 Failure in Distributed Systems Partial failure Happens when one component of a distributed system fails Often leaves

More information

Strategy for Displaying the Recognition Result in Interactive Vision

Strategy for Displaying the Recognition Result in Interactive Vision Strategy for Displaying the Recognition Result in Interactive Vision Yasushi Makihara, Jun Miura Dept. of Computer-controlled Mechanical Sys., Graduate School of Engineering, Osaka Univ., 2-1 Yamadaoka,

More information

The Study of Genetic Algorithm-based Task Scheduling for Cloud Computing

The Study of Genetic Algorithm-based Task Scheduling for Cloud Computing The Study of Genetic Algorithm-based Task Scheduling for Cloud Computing Sung Ho Jang, Tae Young Kim, Jae Kwon Kim and Jong Sik Lee School of Information Engineering Inha University #253, YongHyun-Dong,

More information